Information technology (IT) resources must be utilized respectfully and as authorized and designed.

While utilizing University-owned IT resources, no user or administrator is authorized to engage in any activity that violates University policy or any illegal activity under local, state, federal or international law.

Users and administrators may not engage in any activity that interrupts personal productivity or the service of any University resources. Users and administrators will not intentionally disrupt, damage, or alter data, software, or other IT resources belonging to the University or to any other entity. This includes spreading viruses, sending spam messages, performing denial of service attacks, compromising another individual’s ability to use IT resources, and performing system/network reconnaissance.